Why the Snoopers' Charter Is the Wrong Approach

Total Page:16

File Type:pdf, Size:1020Kb

Why the Snoopers' Charter Is the Wrong Approach DIGITAL SURVEILLANCE Why the Snoopers’ Charter is the wrong approach: A call for targeted and accountable investigatory powers About Open Rights Group Contents Open Rights Group (ORG) was formed in 2005 by a group of technology experts and activists to campaign for human rights and civil liberties in the digital age. ORG is funded by over 1,500 people, each contributing small regular amounts, and a number of grant giving Introduction: 3 organisations such as Joseph Rowntree Reform Trust, Sigrid Rausing Surveillance law is not a ‘them and us’ problem Trust and Open Society Foundation. Chapter 1 7 The history of state surveillance Duncan Campbell Report Editors Jim Killock Since joining Open Rights Group in January Chapter 2 17 Executive Director 2009, Jim has led campaigns against three Regulating surveillance, respecting private life strikes and the Digital Economy Act, the Angela Patrick company Phorm and its plans to snoop on UK Internet users, and against pervasive Chapter 3 31 government Internet surveillance. He is Current and future surveillance technology working on data protection and privacy issues, as well as helping ORG to grow in size Richard Clayton and breadth. He was named as one of the 50 most influential people on IP issues by Chapter 4 39 Managing IP in 2012. In the same year ORG Why digital technology poses a problem for won Liberty’s Human Rights Campaigner of surveillance law Peter Sommer Year award alongside 38 Degrees, for work on issues from copyright to the Snooper’s Chapter 5 Charter. Data preservation instead of data retention Peter Bradwell Peter joined ORG in January 2011, initially Caspar Bowden 47 Policy Director working on copyright reform. Before this he worked at the think tank Demos for CDB and human rights: an international perspective four years, where he focused primarily Simone Halink on technology policy and the relationship 50 between technology and society. Peter has Inflated scope and increased harms of existing authored a number of reports, including our reports on mobile Internet censorship surveillance law Joss Wright 52 in the UK, the availability of digital film services and consultation responses on Freedom offline, surveillance online the Communications Data Bill and data – an unsustainable conflict Nick Pickles 54 protection legislation in Europe. Citizens not suspects: surveillance in a digital age Ben Zevenbergen Ben joined the Open Rights Group on a part-time basis, to help with campaigns Rachel Robinson 56 Researcher and research, alongside his PhD/DPhil on Internet science at the Oxford Internet The future of surveillance laws Institute. He has worked on legal, political Peter Sommer 58 and policy aspects of the information society for several years. Most recently he was a Communications data: getting there from here policy advisor to an MEP in the European Sam Smith 60 Parliament, working on Europe’s Digital Agenda. Previously Ben worked as an ICT/ IP lawyer and policy consultant in the Conclusion and recommendations 64 Netherlands. Ben holds a degree in law, and Another surveillance law is possible 2 a masters in information law. Introduction: Surveillance law is not a ‘them and us’ problem “Anybody who is against this bill is putting politics before people’s lives.... It’s a question of whose side you’re on.” Rt Hon Theresa May MP, December 20121 This statement from the Home Secretary, made in December 2012, tells us a lot about the approach that her Department has taken to the development of surveillance policy. It also helps to explain why the draft Communications Data Bill (CDB) poses such a disproportionate risk to our privacy. The Home Office have often framed the debate over the CDB in ‘them and us’ terms. But if this really does just come down to picking sides, it is odd that both of the Parliamentary committees tasked with examining the draft Bill – the Joint Committee on the draft Communications Data Bill and the Intelligence and Security Committee – reached such critical conclusions2. Both committees noticed that there are more questions to ask when considering surveillance law than whether you are on the side of criminals. They include what current capability gaps there are, what new information will be gathered and from whom, how intrusive the information is, how any technological solutions will work, and what authorisations for access to data should be required. But at no time have the Government attempted to seriously address those questions openly. The Home Office instead wrote the Communications Data Bill in isolation. 3 In its report, the Joint Committee examining the CDB lamented that there was no consultation, no proper definition of the problem and no adequate explanation of, – or evidence for – the Home Office’s proposed solution. The Bill appeared built to withstand public scrutiny, rather than be informed by it. The result is, perhaps unsurprisingly, a draft Bill that the Committee concluded pays “insufficient attention to the duty to respect the right to privacy, and goes further than it need or should.” The CDB would lead to the collection of far too much information, about far too many people – effectively everyone – and would allow far too many people access to it. This report This situation could have been avoided. This report demonstrates that surveillance policy makers have options, many of which are a lot less intrusive than the powers proposed by the CDB, and that civil society is open to meaningful engagement about surveillance laws in the digital age. It is written for a general audience by leading experts, academics and representatives of a number of civil society groups. The articles in this publication serve as an example of the sort of conversations that would be possible through a proper public debate about what information should be collected and who should have access to it. The opening two chapters put the CDB in historical and legal context. In chapter one, Duncan Campbell sets out the history of the tension between state surveillance and efforts to protect individuals’ privacy. He explains why the draft Communications Data Bill is “the latest chapter in the history of British state surveillance.” He also tells the parallel story of efforts to keep surveillance powers in check, including the 1972 Royal Commission on Privacy which “set out 10 principles of data protection that later underpinned data protection statutes in Europe and the UK.” In chapter two Angela Patrick, Director of Human Rights Policy at JUSTICE, gives an overview of the current settlement between the law, surveillance and the protection of privacy. She looks at how the draft Communications Data Bill could exacerbate problems with existing surveillance law, for example relating to oversight and complexity. She highlights that the overriding difference between the draft CDB and the existing law is the move “away from the presumption that for limited purposes, the State may access data already retained or reasonably obtainable by service providers...Instead, it creates a statutory basis for the generation, collection 4 and retention of data about us all.” In chapter three, Richard Clayton outlines in detail key surveillance technologies, showing what information about us is available and how the technology to gather and access it works. He outlines how the ‘filter’ – a key part of the CDB proposals – will work. By correlating information from multiple sources, he explains how the filter can answer complex queries. For example, he suggests that “the source of an embarrassing leak could be identified by cross-correlating records to pick out exactly who in Whitehall sent out an email whose reception by a journalist triggered an immediate call to the relevant newspaper editor.” Peter Sommer, in chapter four, argues that while surveillance law “is about balancing competing objectives”, a number factors inhibit “sensible and balanced discussion”. They include the pace of technological change, the demands of the law enforcement community, the level of technical and legal expertise required to understand how best to respond, and the fear of getting it wrong. Chapter five features contributions from a range of experts setting out how more privacy-friendly surveillance policy could work. For example, Caspar Bowden suggests how ‘data preservation’ policies could work to limit whose data is collected. Sam Smith from Privacy International argues that more could be done to help law enforcement make better use of what information is already available. Rachel Robinson from Liberty recommends lifting the ban on the use of intercept evidence in court, and Peter Sommer calls for a Royal Commission into surveillance laws in the digital age. In our conclusion we draw together these contributions and make some recommendations for future surveillance policy making. Notes 1. http://www.thesun.co.uk/sol/homepage/news/politics/4678082/Track-crime-on-net-or- well-see-more-people-die.html#ixzz2NL7B6fcr 2. See the reports of the Joint Committee on the draft Communications Data Bill (December 2012) http://www.publications.parliament.uk/pa/jt201213/jtselect/jtdraftcomuni/79/7902. htm and the report of the Intelligence and Security Committee (February 2013) http://isc. independent.gov.uk/committee-reports/special-reports 5 Duncan Campbell is a British freelance investigative journalist, author and television producer. Since 1975 he has specialised in the subjects of intelligence and security services, defence, policing, civil liberties and, latterly, computer forensics. 6 Chapter 1 The history of state surveillance Duncan Campbell The range and reach of surveillance legislation proposed or in place in the United Kingdom is far from novel in its roots or in its impact on the balance of power and rights between the subject and the state. The proposals in the Communications Data Bill (CDB), and the manner in which the new Bill has been introduced and managed, fall full square within long British historical precedents that position privacy rights as an irritant to be managed by a combination of concealment, secrecy, information management, and misinformation.
Recommended publications
  • Charles Farr Statement Number: 1 Exhibit: CF1 Dated: 16 May 2014
    Made on behalf of: the Respondents Witness: Charles Farr Statement number: 1 Exhibit: CF1 Dated: 16 May 2014 IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT/13/92/C.H BETWEEN: PRIVACY INTERNATIONAL Claimant and (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE SECRETARY OF STATE FOR THE HOME DEPARTMENT (3) THE SECRET INTELLIGENCE SERVICE (4) THE SECURITY SERVICE (5) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS (6) THE ATTORNEY GENERAL Respondents IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT/13/77/H BETWEEN: LIBERTY Claimant and (1) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS (2) THE SECRET INTELLIGENCE SERVICE (3) THE SECURITY SERVICE Respondents IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT/L3/168-173/H BETWEEN: (1) AMERICAN CIVIL LIBERTIES UNION (2) CANADIAN CIVIL LIBERTIES ASSOCIATION (3) EGYPTIAN INITIATIVE FOR PERSONAL RIGHTS (4) HUNGARIAN CIVIL LIBERTIES UNION (5) IRISH COUNCIL FOR CIVIL LIBERTIES (6) LEGAL RESOURCES CENTRE Claimants and (1) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS (2) THE SECRET INTELLIGENCE SERVICE (3) THE SECURITY SERVICE Respondents 1 IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT/13/194/CH BE1WEEN: AMNESTY INTERNATIONAL LIMITED Claimant and (1) THE SECURITY SERVICE (2) THE SECRET INTELLIGENCE SERVICE (3) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS (4) THE SECRETARY OF STATE FOR THE HOME DEPARTMENT (5) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS Respondents IN THE INVESTIGATORY POWERS TRIBUNAL Case No. IPT/13/204/CH BETWEEN: BYTES FOR ALL Claimant and (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE SECRETARY OF STATE FOR THE HOME DEPARTMENT (3) THE SECRET INTELLIGENCE SERVICE (4) THE SECURITY SERVICE (5) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS (6) THE ATTORNEY GENERAL Respondents WITNESS STATEMENT OF CHARLES BI.ANDFORD FARR ON BEHALF OF THE RESPONDENTS I, Charles Blandford Farr, of the Home Office, 2 Marsham Street, SW1P 4DF will say as follows: 1.
    [Show full text]
  • Preventing Violent Extremism
    House of Commons Communities and Local Government Committee Preventing Violent Extremism Sixth Report of Session 2009–10 Report, together with formal minutes, oral and written evidence Ordered by the House of Commons to be printed 16 March 2010 HC 65 Published on 30 March 2010 by authority of the House of Commons London: The Stationery Office Limited £25.00 Communities and Local Government Committee The Communities and Local Government Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Department for Communities and Local Government and its associated bodies. Current membership Dr Phyllis Starkey MP (Labour, Milton Keynes South West) (Chair) Sir Paul Beresford MP (Conservative, Mole Valley) Mr Clive Betts MP (Labour, Sheffield Attercliffe) John Cummings MP (Labour, Easington) Andrew George MP (Liberal Democrat, St Ives) Mr Greg Hands MP (Conservative, Hammersmith and Fulham) Anne Main MP (Conservative, St Albans) Dr John Pugh MP (Liberal Democrat, Southport) Alison Seabeck MP (Labour, Plymouth Davenport) Andy Slaughter MP (Labour, Islington South and Finsbury) Mr Neil Turner MP (Labour, Wigan) Powers The Committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the Internet via www.parliament.uk. Publications The Reports and evidence of the Committee are published by The Stationery Office by Order of the House. All publications of the Committee (including press notices) are on the Internet at www.parliament.uk/clgcom. Committee staff The current staff of the Committee are Huw Yardley (Clerk of the Committee), Sarah Ioannou (Second Clerk), Josephine Willows (Inquiry Manager), Emma Gordon (Committee Specialist), Lorna Horton (Senior Committee Assistant), Nicola McCoy (Committee Assistant), Stewart McIlvenna (Committee Support Assistant), and Hannah Pearce (Select Committee Media Officer).
    [Show full text]
  • Open Innovation in the Proprietary World
    Round Table Open Innovation in the Proprietary World 19 March 2015 DiploFoundation, WMO Building, 7bis, Avenue de la Paix, Geneva, Switzerland Agenda 8:45 – 9:15 Registration 9:15– 9:30 Welcome & Introductions Joe Cannataci (Project Coordinator; University of Groningen), Oleksandr Pastukhov (Head of IPR project work package; University of Malta), Jovan Kurbalija (DiploFoundation) 9:30 – 10:30 Key-note address on Open Innovation v. ‘property logic’ Darren Todd (Author, “Pirate Nation”; Editor, Evolved Publishing) 10:30 – 10:45 Coffee break 10:45 – 11:30 Session 1: IP policies today – failing to understand innovation? Moderator: Bogdan Manolea (ApTI) Principal discussants: Rihards Gulbis (Ministry of Culture, Latvia), Jim Killock (Open Rights Group), Philippe Laurent (Marx, Van Ranst, Vermeersch & Partners) Special intervention on F/OSS in developing countries by Nnenna Nwakanma (World Wide Web Foundation) 11:30 – 12:45 Session 2: Business models for the Free/Open Source movement Moderator: Pedro Gomez (Hoplite Software) Principal discussants: Mario Pena (Safe Creative), Georg Greve (Free Software Foundation Europe), Giuseppe Mazziotti (Trinity College Dublin) 12:45 – 13:30 Lunch 13:30 – 14:30 Second key-note address on Creative Commons and Open Access initiatives George Greve (Free Software Foundation Europe) 14:30 – 15:15 Session 3: Open Data, Open Access and Open Education resources – key to Open Innovation Moderator: Oleksandr Pastukhov (Head of IPR project work package; University of Malta) Principal discussants: Claire Gallon (Libertic),
    [Show full text]
  • Edition No. 3 March 2019
    GDPR Today Edition No. 3 March 2019 European Commission urged to investigate Romanian GDPR implementation GDPR loopholes facilitate data exploitation by political parties Uber drivers demand their data After Brexit, the EU must decide if UK data protection is adequate 2 GDPR in Numbers 6 European Commission urged to investigate Romanian GDPR implementation 8 Spain: DPA limits the use of data in political campaigning 10 Netherlands: DPA rules websites must allow people to refuse tracking cookies 12 GDPR loopholes facilitate data exploitation by political parties 14 Privacy policies for Internet of Things devices must comply with GDPR 15 Uber drivers demand their data New evidence in AdTech complaint 15 EDPB: e-Privacy and GDPR work together 16 to protect people’s data 18 German competition regulator demands changes to Facebook’s use of personal data 20 After Brexit, the EU must decide if UK data protection is adequate 22 EDPS 2018 Annual Report highlights the power and limitation of data protection 24 GDPR Tools 25 EU National Data Protection Authority Contact Details Editorial Welcome to GDPR Today – your online hub for staying Not all is positive progress. It is disappointing that the tuned to the (real) life of EU data protection law. As you European Commission has still not yet taken action to know, every two months we publish statistics showing how ensure that Romania properly implements the GDPR. the GDPR is being applied across Europe. We also share There are also several countries which have yet to relevant news, from legal guidelines and decisions to publish any GDPR data.
    [Show full text]
  • Hizb Ut-Tahrir Ideology and Strategy
    HIZB UT-TAHRIR IDEOLOGY AND STRATEGY “The fierce struggle… between the Muslims and the Kuffar, has been intense ever since the dawn of Islam... It will continue in this way – a bloody struggle alongside the intellectual struggle – until the Hour comes and Allah inherits the Earth...” Hizb ut-Tahrir The Centre for Social Cohesion Houriya Ahmed & Hannah Stuart HIZB UT-TAHRIR IDEOLOGY AND STRATEGY “The fierce struggle… between the Muslims and the Kuffar, has been intense ever since the dawn of Islam... It will continue in this way – a bloody struggle alongside the intellectual struggle – until the Hour comes and Allah inherits the Earth...” Hizb ut-Tahrir The Centre for Social Cohesion Houriya Ahmed & Hannah Stuart Hizb ut-Tahrir Ideology and Strategy Houriya Ahmed and Hannah Stuart 2009 The Centre for Social Cohesion Clutha House, 10 Storey’s Gate London SW1P 3AY Tel: +44 (0)20 7222 8909 Fax: +44 (0)5 601527476 Email: [email protected] www.socialcohesion.co.uk The Centre for Social Cohesion Limited by guarantee Registered in England and Wales: No. 06609071 © The Centre for Social Cohesion, November 2009 All the Institute’s publications seek to further its objective of promoting human rights for the benefit of the public. The views expressed are those of the author, not of the Institute. Hizb ut-Tahrir: Ideology and Strategy By Houriya Ahmed and Hannah Stuart ISBN 978-0-9560013-4-4 All rights reserved The map on the front cover depicts Hizb ut-Tahrir’s vision for its Caliphate in ‘Islamic Lands’ ABOUT THE AUTHORS Houriya Ahmed is a Research Fellow at the Centre for Social Cohesion (CSC).
    [Show full text]
  • Whole Day Download the Hansard Record of the Entire Day in PDF Format. PDF File, 0.75
    Monday Volume 654 18 February 2019 No. 254 HOUSE OF COMMONS OFFICIAL REPORT PARLIAMENTARY DEBATES (HANSARD) Monday 18 February 2019 © Parliamentary Copyright House of Commons 2019 This publication may be reproduced under the terms of the Open Parliament licence, which is published at www.parliament.uk/site-information/copyright/. 1171 18 FEBRUARY 2019 1172 The Secretary of State for Defence (Gavin Williamson): House of Commons May I take this opportunity to associate us with your comments about Paul Flynn, Mr Speaker? I remember Monday 18 February 2019 having the privilege of serving with Paul on the British-Irish The House met at half-past Two o’clock Parliamentary Assembly. As you quite rightly stated, he was always incredibly passionate about his constituents PRAYERS and about his beliefs. As a former Chief Whip, I also agree that Labour Members not following their Whip is [MR SPEAKER in the Chair] good advice, but the same is not necessarily true on the Conservative side. BUSINESS BEFORE QUESTIONS The UK will pursue a distinctive, independent and DEATH OF A MEMBER sovereign foreign and defence policy that meets British interests and promotes our values. Mr Speaker: It is with great sadness that I have to inform the House of the death of the hon. Member for Helen Goodman: Mr Speaker, on my behalf and, I am Newport West, Paul Flynn. A dedicated, principled, sure, that of other hon. Members on the Opposition fearlessandaward-winningparliamentarian,Paulrepresented side, I would like to echo your words about Paul Flynn, and championed the Newport West constituency and whom I will always remember for his great independence the wider interests, as he saw them, of Wales for 31 and a of spirit and fantastic sense of humour.
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]
  • Electronic Democracy the World of Political Science— the Development of the Discipline
    Electronic Democracy The World of Political Science— The development of the discipline Book series edited by Michael Stein and John Trent Professors Michael B. Stein and John E. Trent are the co-editors of the book series “The World of Political Science”. The former is visiting professor of Political Science, University of Toronto, Toronto, Ontario, Canada and Emeritus Professor, McMaster University in Hamilton, Ontario, Canada. The latter is a Fellow in the Center of Governance of the University of Ottawa, in Ottawa, Ontario, Canada, and a former professor in its Department of Political Science. Norbert Kersting (ed.) Electronic Democracy Barbara Budrich Publishers Opladen • Berlin • Toronto 2012 An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched. KU is a collaborative initiative designed to make high quality books Open Access for the public good. The Open Access ISBN for this book is 978-3-86649-546-3. More information about the initiative and links to the Open Access version can be found at www.knowledgeunlatched.org © 2012 This work is licensed under the Creative Commons Attribution-ShareAlike 4.0. (CC- BY-SA 4.0) It permits use, duplication, adaptation, distribution and reproduction in any medium or format, as long as you share under the same license, give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. To view a copy of this license, visit https://creativecommons.org/licenses/by-sa/4.0/ © 2012 Dieses Werk ist beim Verlag Barbara Budrich GmbH erschienen und steht unter der Creative Commons Lizenz Attribution-ShareAlike 4.0 International (CC BY-SA 4.0): https://creativecommons.org/licenses/by-sa/4.0/ Diese Lizenz erlaubt die Verbreitung, Speicherung, Vervielfältigung und Bearbeitung bei Verwendung der gleichen CC-BY-SA 4.0-Lizenz und unter Angabe der UrheberInnen, Rechte, Änderungen und verwendeten Lizenz.
    [Show full text]
  • Roots of Violent Radicalisation
    House of Commons Home Affairs Committee Roots of violent radicalisation Nineteenth Report of Session 2010–12 Volume I Volume I: Report, together with formal minutes, oral and written evidence Additional written evidence is contained in Volume II, available on the Committee website at www.parliament.uk/homeaffairscom Ordered by the House of Commons to be printed 31 January 2012 HC 1446 Published on 6 February 2012 by authority of the House of Commons London: The Stationery Office Limited £20.00 The Home Affairs Committee The Home Affairs Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Home Office and its associated public bodies. Current membership Rt Hon Keith Vaz MP (Labour, Leicester East) (Chair) Nicola Blackwood MP (Conservative, Oxford West and Abingdon) James Clappison MP (Conservative, Hertsmere) Michael Ellis MP (Conservative, Northampton North) Lorraine Fullbrook MP (Conservative, South Ribble) Dr Julian Huppert MP (Liberal Democrat, Cambridge) Steve McCabe MP (Labour, Birmingham Selly Oak) Rt Hon Alun Michael MP (Labour & Co-operative, Cardiff South and Penarth) Bridget Phillipson MP (Labour, Houghton and Sunderland South) Mark Reckless MP (Conservative, Rochester and Strood) Mr David Winnick MP (Labour, Walsall North) Powers The Committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the Internet via www.parliament.uk. Publication The Reports and evidence of the Committee are published by The Stationery Office by Order of the House. All publications of the Committee (including press notices) are on the Internet at www.parliament.uk/homeaffairscom.
    [Show full text]
  • Writetothem.Com
    WriteToThem.com Analysis of users and usage for UK Citizens Online Democracy May 2011 Tobias Escher1 http://people.oii.ox.ac.uk/escher/ :: [email protected] 1 Tobias Escher is currently a Doctoral Student at the Oxford Internet Institute of the University of Oxford. About this report This report was commissioned by UK Citizens Online Democracy as part of an evaluation of the major mySociety websites. UK Citizens Online Democracy 483 Green Lanes LONDON N13 4BS United Kingdom Acknowledgements The author would like to thank the Oxford Internet Institute for making available the dataset of the Oxford Internet Survey 2007 & 2009 and in particular Ellen Helsper for her advice. Furthermore this research has benefited from discussions with Steffen Albrecht and Matthias Trénel. Not least various members of mySociety have provided valuable help. Copyright This report is licensed under a Creative Commons Attribution-Non-Commercial-Share Alike 2.0 UK: England & Wales Licence. This allows you to copy, distribute, display, and perform the work and to make derivative works for non-commercial purposes as long as you give the original author credit and share any derivative works under the same license. For more information, see http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ For any use not covered by this license please contact [email protected] 2 of 73 Contents Executive Summary ..................................................................................................................................... 4 1 Site Description ..................................................................................................................................
    [Show full text]
  • Ofcom BBC DRM Consultation Response
    Ofcom BBC DRM consultation response Organisational Signatories (see end for personal signatories): 1. Open Rights Group 2. Electronic Frontier Foundation 3. Consumer Focus 4. Free Software Foundation 5. Somethin' Else! 6. FriBit, Norway 7. Electronic Frontier, Norway 8. Open Source Initiative 9. Vrijschrift/Scriptum Libre 10. European Digital Rights 1. Summary Open Rights Group (ORG) was founded in 2005 by 1,000 digital activists. It has since become the UK’s leading voice defending freedom of expression, privacy, innovation, consumer rights and creativity on the net. ORG is pleased to contribute to this Ofcom consultation. ORG believes that the BBC has not made a case for adding DRM to its free-to-air broadcasts. The DRM proposed by the BBC (like all DRM systems) will not be adequate to prevent unauthorised redistribution of FTA broadcasts. Further, the existence of other, DRM-free versions of the same content (such as US FTA broadcasts) means that would-be redistributors can dispense with the bother of breaking the BBC's DRM and redistribute copies of the content that have originated from other sources, making the case for DRM even less sensible. However, this DRM failure will not have a material effect on the UK DTT rollout. The threats of unspecified copyright holders to boycott DTT without DRM are simply not credible; they are a re-hash of threats made over US broadcasts seven years ago, threats that rightsholders have not carried out. Furthermore, if access to the unspecified imperilled content is critical to DTT rollout, then this measure is inadequate to ensure that it will be present on DTT if the BBC gets its way, as the BBC has not produced any promises from rightsholders to the effect that they will license to DTT once DRM is in place.
    [Show full text]
  • Digital Data Increasingly Plays a Central Role in Contemporary Politics and Public in September 2016 (DATACTIVE)
    Krisis 2018, Issue 1 1 Data Activism www.krisis.eu Reversing Data Politics: An Introduction to the Special Issue advertising to the monitoring of citizens. Many aspects of the state and the market Lonneke van der Velden and Stefania Milan today have to do with the ‘data economy’ and its rules (or lack thereof). In this special issue, we are also interested in ‘data politics’, but we want to shift the focus of the conversation. Big data corporations and intelligence agencies are not the only ones acting on datafication, or the process of turning into monetizable and analyzable data many aspects of life that had never been quantified before, such as people’s emotions and interpersonal connections. Non-governmental organiza- tions, hackers, and activists of all kinds provide a myriad of ‘alternative’ interven- tions, interpretations, and imaginaries of what data stands for and what can be done with it. The idea of the special issue emerged during a two-day workshop on ‘Contentious Data’ hosted by the research group DATACTIVE at the University of Amsterdam Digital data increasingly plays a central role in contemporary politics and public in September 2016 (DATACTIVE). As the organisers argued elsewhere, these life. Citizen voices in the so-called public sphere are increasingly mediated by pro- emerging forms of ‘data activism’, that is to say socio-technical mobilizations and prietary social media platforms such as Twitter and Facebook, and are thus shaped tactics taking a critical approach towards datafication and massive data collection, by algorithmic ranking and re-ordering. ‘Calculated publics’ fashioned by ‘new offer new epistemologies able to counteract the mainstream positivistic discourse kinds of human and machine interaction’ (Amoore and Piotukh 2016, 2) replace of datafication (Milan and van der Velden 2016).
    [Show full text]